User's Manual

2
TableofContents
GUTERMANN ............................................................................................................................... 1
1. Introduction.................................................................................................................5
1.1. SystemComponents ................................................................................................................ 6
1.2. Radiologgers ........................................................................................................................... 6
1.3. SystemCommunicationLink ................................................................................................... 6
2. ZONESCAN800software..............................................................................................6
2.2. InitialZS800CommlinkSetup .................................................................................................. 7
2.2. CheckRadioConnection .......................................................................................................... 8
2.3. InitialZS820CommlinkSetup .................................................................................................. 8
1 ZonescanLoggersProcessFlowChart...........................................................................9
3. CreatinganewDatabase............................................................................................10
3.1 InsertingaNewLogger .......................................................................................................... 11
3.2 InsertMulipleLoggers ........................................................................................................... 11
3.3 LoggerSetupMeasurementSettings ................................................................................. 12
3.4 Zonescan820SensitivityBoost ............................................................................................. 13
4 ProgrammingtheLoggers..........................................................................................14
4.1 Programming‐Correlation .................................................................................................... 15
4.2 Whenalogger(s)failstosynchronize ................................................................................... 16
5 DeployingtheZonescanLoggers................................................................................17
5.1 DeployingtheLoggersinthefield ......................................................................................... 18
6 ImportingaDigitalMapintotheZonescanSoftware..................................................19
7 DownloadingthedataintheLoggers.........................................................................24
7.1 SettingtheThresholdLeakLevels ......................................................................................... 25
7.2 StarttheDownload ............................................................................................................... 26
8 TheNoiseLoggingPrincipal........................................................................................28
Tab.2Thefirstsampletakenof12dBisplottedonthehistogrambelowinFig.A.....................................29
Tab.3thesecondsampletakenof12dBisplottedonthehistogrambelowinFig.B.................................30
Tab.4thethirdsampletakenof12dBisplottedonthehistogrambelowinFig.C....................................31
Tab.5thefourthsampletakenof21dBisplottedonthehistogrambelowinFig.D..................................32
Tab.6thefifthsampletakenof18dBisplottedonthehistogrambelowinFig.E.....................................33
Tab.7thesixthsampletakenof12dBisplottedonthehistogrambelowinFig.F.....................................34
Tab.8theseventhsampletakenof13dBisplottedonthehistogrambelowinFig.G................................35
Tab.9theeighthsampletakenof12dBisplottedonthehistogrambelowinFig.H..............36
9 AnalysingResults.......................................................................................................37
9.1 NoLeakResult ....................................................................................................................... 38
9.2 PossibleLeakResult .............................................................................................................. 39
9.3 ProbableLeakResult ............................................................................................................. 40
9.4 Interpretingnoiseloggingresults ......................................................................................... 41
9.5 Whichloggerisclosertotheleak? ........................................................................................ 43
9.6 WhatistheLeakValue? ........................................................................................................ 44
9.7 ReliabilityofResults .............................................................................................................. 44
10 PerformingCorrelations.............................................................................................45
10.1 Correlationbetweentwologgers .......................................................................................... 45
10.2 TheCorrelationResult ........................................................................................................... 47
10.3 ExhaustiveCorrelation .......................................................................................................... 48
11 InterpretingtheCorrelationResults...........................................................................49
12 ProjectManagement..................................................................................................52
13 AppendixSection.......................................................................................................53